The paper discussed was the Patagonix paper from USENIX Security Symposium 2008. This is a interesting work about using virtualization technique to detect stealthy rootkits. The paper is available from this here .
The slides used in the discussion is available from here.
Cambridge Cybercrime Conference 2025 – Liveblog
1 month ago
No comments:
Post a Comment